Search This Blog

Wednesday, October 24, 2018

Computer gk

Q.1 An e-mail address typically consists of a user ID followed by the _________ sign and the name of the e-mail server that manages the user’s electronic post office box. 

(1) _(UNDER SCORE) 

(2) # 

(3) & 

(4) * 

(5) None of these 

Q.2 A repeater works in the _______ of the OSI model. 

(1) Data Link Layer 

(2) Physical Layer 

(3) Network Layer 

(4) Presentation Layer 

(5) Session Layer 

Q.3 If a file has a .BMP file extension, what kind of data does it contain? 

(1) Audio 

(2) Video 

(3) Raster Graphics 

(4) Vector Graphics 

(5) 1 and 3 

Q.4 Restarting computer that is already on is referred to as ______. 

(1) Cold booting 

(2) Shut down 

(3) Spooling 

(4) Logging off 

(5) None of these 

Q.5 What is full form of UNIVAC-1 ? 

(1) Universal Automatic Computer 

(2) Universal Automation Computer 

(3) Universal Automated Calculator 

(4) University of Advance Computer 

(5) None of these 

Q.6 Which of the following memories needs refresh ? 

(1) SRAM 

(2) DRAM 

(3) ROM 

(4) All of these 

(5) None of these 

Q.7 The communication mode that supports two-way traffic but only one direction at a time is- 

(1) Simplex 

(2) half duplex 

(3) duplex 

(4) multiplex 

(5) All of the above 

Q.8 A way to communicate with a remote computer over a network - 

(1) Telnet 

(2) Patch 

(3) Keyboard 

(4) CPU 

(5) None of these 

Q.9 What is the purpose of metadata? 

(1) It logs system events. 

(2) It is used to convert data from one format to another. 

(3) It serves as a backup of the original data. 

(4) It logs processor events. 

(5) It describes other data. 

Q.10 How many different documents can be opened at one time? 

(1) Not more than three 

(2) Only One 

(3) As many as your computer memory will hold 

(4) More than three 

(5) None of these 

Answers- 

Q.1 (5) 

An e-mail address typically consists of a user ID followed by the @ sign and the name of the e-mail server that manages the user’s electronic post office box. 

Q.2 (2) 

A repeater works on physical layer. 

Q.3 (3) 

The BMP format is a commonly used raster graphic format for saving image files. 

Q.4 (5) 

Restarting a computer that is already on is referred to as warm booting. 

Q.5 (1) 

Universal automatic computer. 

Q.6 (2) 

Q.7 (2) 

The communication mode that supports two-way traffic but only one direction at a time is known as half duplex. 

Q.8 (1) 

Telnet is a way to communicate with a remote computer over a network. 

Q.9 (5) 

It provides information about a certain item’s content. 

Q.10 (3) 

As many as your computer memory will hold. 

Tuesday, October 23, 2018

Computer gk

Q.1 Which of the following uses is a form of computer technology in the home? 

(1) Managing a bank account 

(2) Writing papers and memos 

(3) Shopping for personal transportation 

(4) All of the above 

(5) None of these 

Q.2 What are the three main components of a computer system? 

(1) Desktop, icons, and mouse 

(2) Input, processing, and output 

(3) Internet, World Wide Web, and LAN 

(4) Hardware, software, and user 

(5) None of these 

Q.3 What is the purpose of the central processing unit in a computer? 

(1) To output reports 

(2) To input data so that the computer can process 

(3) To store computer data and information 

(4) To manipulate input data into useful information 

(5) None of these 

Q.4 The operating system called Windows NT is meant mostly for __________, networked environments. 

(1) WAN 

(2) Corporate 

(3) LAN 

(4) Home 

(5) None of these 

Q.5 A computer virus that invades the system startup code stored on the beginning tracks of a hard disk is known as a____________. 

(1) Program file virus 

(2) Macro virus 

(3) Worm 

(4) Boot sector virus 

(5) None of these 

Q.6 CIS stands for_____ .

(1) Computer Integrated Systems 

(2) Computer Information Systems 

(3) Computer Improved Systems 

(4) Computer Interchangeable Systems 

(5) None of these 

Q.7 The java Programming language is developed by: 

(1) Sun Microsystems 

(2) Novel 

(3) Cisco 

(4) Microsoft 

(5) None of these 

Q.8 Complex device used to connect two or more networks is called a: 

(1) Node 

(2) Network interface card 

(3) Router 

(4) Modem 

(5) None of these 

Q.9 Which of the following is NOT handled by a topology? 

(1) Connection 

(2) Collisions 

(3) Arrangement 

(4) Layers 

(5) None of these 

Q.10 Which of the following must be used for ATM transactions? 

(1) Real-time processing 

(2) Batch processing 

(3) ERP 

(4) Data warehousing 

(5) None of these 

ANSWERS 

Q.1 (4) 

Q.2 (4) 

Hardware, software and user are the three main components of computer system. 

Q.3 (4) 

CPU manipulates input data into useful information. 

Q.4 (2) 

Corporate use window NT for networking. 

Q.5 (4) 

Boot sector virus attacks on hard disk at the time of start-up. 

Q.6 (2) 

Q.7 (1) 

Java programming language developed by sun micro systems. 

Q.8 (3) 

Router connects two or more network. 

Q.9 (4) 

Layers are not handled by topology. 

Q-10 (1)